This document provides a summary of the transport layer of computer networks. It discusses key topics like UDP, TCP, connection management, flow control, congestion control, and quality of service. UDP provides a connectionless, unreliable service while TCP provides connection-oriented, reliable byte streaming. TCP uses three-way handshaking for connection establishment and termination. It implements flow control using sliding windows and employs congestion control algorithms like additive increase/multiplicative decrease. The document also covers transport layer concepts like ports, checksums, and retransmission methods in TCP.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
Error control techniques allow for detection and correction of errors during data transmission. Error control is implemented at the data link layer using automatic repeat request (ARQ) protocols like stop-and-wait and sliding window. Stop-and-wait involves transmitting a single frame and waiting for an acknowledgment before sending the next frame. Sliding window protocols allow multiple unacknowledged frames to be transmitted by using frame numbers and acknowledging receipt of frames. These protocols detect errors when frames are received out of sequence and trigger retransmission of lost frames.
This document provides an overview of key concepts in network layer delivery, forwarding, and routing. It discusses delivery and forwarding of packets, including direct vs indirect delivery and next-hop vs route forwarding methods. It also summarizes several unicast routing protocols, including distance vector protocols like RIP and link state protocols like OSPF. Finally, it discusses path vector routing and Border Gateway Protocol (BGP) for interdomain routing.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
The document discusses the User Datagram Protocol (UDP). It provides the following key points:
- UDP is an alternative to TCP that offers a limited connectionless datagram service for delivery of messages between devices on an IP network. It does not guarantee delivery, order of packets, or duplicate protection like TCP.
- UDP is commonly used for applications that require low latency and minimal processing time like DNS, SNMP, and streaming media. These applications can tolerate some data loss since reliability is not critical.
- The UDP header is only 8 bytes, containing source/destination port numbers and length fields. It provides an optional checksum for error detection but no other reliability mechanisms.
The document discusses IPv4 and its datagram format. It explains that IPv4 is a best-effort, connectionless protocol that provides no error control or flow control. The datagram format includes a header containing fields like version, header length, total length, protocol, source/destination addresses, and an optional data field. It describes fields related to fragmentation, checksum calculation, and optional header fields like timestamps and routing options.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
Error control techniques allow for detection and correction of errors during data transmission. Error control is implemented at the data link layer using automatic repeat request (ARQ) protocols like stop-and-wait and sliding window. Stop-and-wait involves transmitting a single frame and waiting for an acknowledgment before sending the next frame. Sliding window protocols allow multiple unacknowledged frames to be transmitted by using frame numbers and acknowledging receipt of frames. These protocols detect errors when frames are received out of sequence and trigger retransmission of lost frames.
This document provides an overview of key concepts in network layer delivery, forwarding, and routing. It discusses delivery and forwarding of packets, including direct vs indirect delivery and next-hop vs route forwarding methods. It also summarizes several unicast routing protocols, including distance vector protocols like RIP and link state protocols like OSPF. Finally, it discusses path vector routing and Border Gateway Protocol (BGP) for interdomain routing.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
The document discusses the User Datagram Protocol (UDP). It provides the following key points:
- UDP is an alternative to TCP that offers a limited connectionless datagram service for delivery of messages between devices on an IP network. It does not guarantee delivery, order of packets, or duplicate protection like TCP.
- UDP is commonly used for applications that require low latency and minimal processing time like DNS, SNMP, and streaming media. These applications can tolerate some data loss since reliability is not critical.
- The UDP header is only 8 bytes, containing source/destination port numbers and length fields. It provides an optional checksum for error detection but no other reliability mechanisms.
The document discusses IPv4 and its datagram format. It explains that IPv4 is a best-effort, connectionless protocol that provides no error control or flow control. The datagram format includes a header containing fields like version, header length, total length, protocol, source/destination addresses, and an optional data field. It describes fields related to fragmentation, checksum calculation, and optional header fields like timestamps and routing options.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
This document provides information about error detection and correction techniques used in computer networks. It discusses different types of errors that can occur like single-bit and burst errors. It explains that redundancy is needed to detect or correct errors by adding extra bits. Detection techniques discussed include parity checks, checksumming, and cyclic redundancy checks. Parity checks can only detect odd number of errors. Cyclic redundancy checks use polynomial arithmetic to generate a checksum. Forward error correction allows detection and correction of errors by adding redundant bits to distinguish different error possibilities. Hamming code is an example of an error correcting code that can detect and correct single bit errors.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
The document discusses congestion control in computer networks. It defines congestion as occurring when the load on a network is greater than the network's capacity. Congestion control aims to control congestion and keep the load below capacity. The document outlines two categories of congestion control: open-loop control, which aims to prevent congestion; and closed-loop control, which detects congestion and takes corrective action using feedback from the network. Specific open-loop techniques discussed include admission control, traffic shaping using leaky bucket and token bucket algorithms, and traffic scheduling.
Packet switching refers to protocols where messages are divided into packets before being transmitted. Each packet is transmitted individually and can take different routes to the destination. Once all packets arrive, they are recompiled into the original message. There are two main approaches: virtual circuits establish a pre-planned route before transmission, while datagrams treat each packet independently without connection setup. Virtual circuits provide sequencing but are less reliable if a node fails, while datagrams are more flexible but packets may arrive out of order.
This document provides an overview of data link control (DLC) and data link layer protocols. It discusses the key functions of DLC including framing, flow control, and error control. Framing involves encapsulating data frames with header information like source and destination addresses. Flow control manages the flow of data between nodes while error control handles detecting and correcting errors. Common data link layer protocols described include simple protocol, stop-and-wait protocol, and High-Level Data Link Control (HDLC). HDLC is a bit-oriented protocol that supports full-duplex communication over both point-to-point and multipoint links. It uses three types of frames: unnumbered, information, and supervisory frames.
This document discusses different types of routing protocols for mobile ad hoc networks. It begins by classifying routing protocols into four categories: proactive (table-driven), reactive (on-demand), hybrid, and geographic location-assisted. It then provides more details on proactive protocols like DSDV, and reactive protocols like DSR and AODV. For DSDV, it describes how routing tables are regularly exchanged and updated when link breaks occur. For DSR and AODV, it explains how routes are discovered on-demand via route requests and replies. Key differences between DSR and AODV are also summarized.
The document discusses MAC layer protocols, specifically CSMA/CD and CSMA/CA.
CSMA/CD is used for wired networks and works by having nodes listen to check if the medium is free before transmitting. If a collision is detected, transmission stops and resumes after a backoff time.
CSMA/CA is used for wireless networks and aims to avoid collisions through the use of request to send, clear to send, and acknowledgement frames exchanged between nodes, rather than detecting collisions.
Both protocols reduce collisions compared to simple CSMA, but CSMA/CA is less efficient and cannot completely solve collisions in wireless networks due to issues like hidden terminals.
Global state recording in Distributed SystemsArsnet
This document describes algorithms for recording consistent global states (snapshots) in distributed systems. It discusses models of communication, system models, and issues in recording global states. It then summarizes the Spezialetti-Kearns algorithm for FIFO systems, which uses markers to distinguish messages to include in snapshots. For non-FIFO systems, it covers the Lai-Yang algorithm using message coloring and Mattern's algorithm based on vector clocks.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document discusses and compares two routing protocols: distance vector routing and link state routing. Distance vector routing involves each node sharing its routing table only with its neighbors, while link state routing involves each node having knowledge of the entire network topology. The document outlines the working principles, drawbacks like count to infinity, and pros and cons of each approach.
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
This document discusses data communication and computer networks. It defines data communication as the exchange of data between devices via transmission medium. A data communication system has five components: sender, receiver, message, medium, and protocol. Communication can be simplex, half-duplex, or full-duplex. The document also defines networks, explaining that a network allows interconnected devices to communicate and share resources. Local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) are described as the main categories of networks.
The document is a seminar report on Wideband Code Division Multiple Access (WCDMA) technology. It discusses the basics of WCDMA, including that it uses code division multiple access to separate users and spread signals over a wide 5MHz bandwidth. It also covers WCDMA specifications, generation, spreading principles, power control, handovers, and advantages such as service flexibility and spectrum efficiency.
The document discusses network layer concepts including packet switching, IP addressing, and fragmentation. It provides details on:
- Packet switching breaks data into packets that are routed independently and reassembled at the destination. This allows for more efficient use of bandwidth compared to circuit switching.
- IP addresses in IPv4 are 32-bit numbers that identify devices on the network. Addresses are expressed in decimal notation like 192.168.1.1. Fragmentation breaks packets larger than the MTU into smaller fragments for transmission.
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Overview of the Fisheye State Routing (FSR) for cellular networks, IDC 2012
By Yoav Francis and Nir Solomon
(Part of a performance comparison of various routing algorithms in cellular networks)
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines programming challenges for sensor networks and different approaches like event-driven execution, node-level software platforms, and state-centric programming.
TCP uses congestion control to determine how much capacity is available in the network and regulate how many packets can be in transit. It uses additive increase/multiplicative decrease (AIMD) where the congestion window is increased slowly with each ACK but halved upon timeout. Slow start is used initially and after idle periods to grow the window exponentially until congestion is detected. Fast retransmit and fast recovery help detect and recover from packet loss without requiring a timeout.
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
Data link control involves framing data, flow and error control, and common protocols like HDLC and PPP. Framing involves adding source/destination addresses to frames for transmission. Flow control restricts how much data the sender sends before waiting for acknowledgment. Error control uses techniques like automatic repeat request to retransmit lost data frames. HDLC and PPP are protocols that define frame formats and control procedures for point-to-point links.
TCP provides reliable, ordered, and error-checked delivery of data between applications running on hosts communicating over an IP network. It uses three-way handshake for connection establishment, acknowledgments and retransmissions for reliability, flow control using sliding windows, and congestion control using slow start and congestion avoidance. TCP has timers for retransmissions, persistence, keepalives, and ensuring connections have terminated.
This document provides information about error detection and correction techniques used in computer networks. It discusses different types of errors that can occur like single-bit and burst errors. It explains that redundancy is needed to detect or correct errors by adding extra bits. Detection techniques discussed include parity checks, checksumming, and cyclic redundancy checks. Parity checks can only detect odd number of errors. Cyclic redundancy checks use polynomial arithmetic to generate a checksum. Forward error correction allows detection and correction of errors by adding redundant bits to distinguish different error possibilities. Hamming code is an example of an error correcting code that can detect and correct single bit errors.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
The document discusses congestion control in computer networks. It defines congestion as occurring when the load on a network is greater than the network's capacity. Congestion control aims to control congestion and keep the load below capacity. The document outlines two categories of congestion control: open-loop control, which aims to prevent congestion; and closed-loop control, which detects congestion and takes corrective action using feedback from the network. Specific open-loop techniques discussed include admission control, traffic shaping using leaky bucket and token bucket algorithms, and traffic scheduling.
Packet switching refers to protocols where messages are divided into packets before being transmitted. Each packet is transmitted individually and can take different routes to the destination. Once all packets arrive, they are recompiled into the original message. There are two main approaches: virtual circuits establish a pre-planned route before transmission, while datagrams treat each packet independently without connection setup. Virtual circuits provide sequencing but are less reliable if a node fails, while datagrams are more flexible but packets may arrive out of order.
This document provides an overview of data link control (DLC) and data link layer protocols. It discusses the key functions of DLC including framing, flow control, and error control. Framing involves encapsulating data frames with header information like source and destination addresses. Flow control manages the flow of data between nodes while error control handles detecting and correcting errors. Common data link layer protocols described include simple protocol, stop-and-wait protocol, and High-Level Data Link Control (HDLC). HDLC is a bit-oriented protocol that supports full-duplex communication over both point-to-point and multipoint links. It uses three types of frames: unnumbered, information, and supervisory frames.
This document discusses different types of routing protocols for mobile ad hoc networks. It begins by classifying routing protocols into four categories: proactive (table-driven), reactive (on-demand), hybrid, and geographic location-assisted. It then provides more details on proactive protocols like DSDV, and reactive protocols like DSR and AODV. For DSDV, it describes how routing tables are regularly exchanged and updated when link breaks occur. For DSR and AODV, it explains how routes are discovered on-demand via route requests and replies. Key differences between DSR and AODV are also summarized.
The document discusses MAC layer protocols, specifically CSMA/CD and CSMA/CA.
CSMA/CD is used for wired networks and works by having nodes listen to check if the medium is free before transmitting. If a collision is detected, transmission stops and resumes after a backoff time.
CSMA/CA is used for wireless networks and aims to avoid collisions through the use of request to send, clear to send, and acknowledgement frames exchanged between nodes, rather than detecting collisions.
Both protocols reduce collisions compared to simple CSMA, but CSMA/CA is less efficient and cannot completely solve collisions in wireless networks due to issues like hidden terminals.
Global state recording in Distributed SystemsArsnet
This document describes algorithms for recording consistent global states (snapshots) in distributed systems. It discusses models of communication, system models, and issues in recording global states. It then summarizes the Spezialetti-Kearns algorithm for FIFO systems, which uses markers to distinguish messages to include in snapshots. For non-FIFO systems, it covers the Lai-Yang algorithm using message coloring and Mattern's algorithm based on vector clocks.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document discusses and compares two routing protocols: distance vector routing and link state routing. Distance vector routing involves each node sharing its routing table only with its neighbors, while link state routing involves each node having knowledge of the entire network topology. The document outlines the working principles, drawbacks like count to infinity, and pros and cons of each approach.
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
This document discusses data communication and computer networks. It defines data communication as the exchange of data between devices via transmission medium. A data communication system has five components: sender, receiver, message, medium, and protocol. Communication can be simplex, half-duplex, or full-duplex. The document also defines networks, explaining that a network allows interconnected devices to communicate and share resources. Local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) are described as the main categories of networks.
The document is a seminar report on Wideband Code Division Multiple Access (WCDMA) technology. It discusses the basics of WCDMA, including that it uses code division multiple access to separate users and spread signals over a wide 5MHz bandwidth. It also covers WCDMA specifications, generation, spreading principles, power control, handovers, and advantages such as service flexibility and spectrum efficiency.
The document discusses network layer concepts including packet switching, IP addressing, and fragmentation. It provides details on:
- Packet switching breaks data into packets that are routed independently and reassembled at the destination. This allows for more efficient use of bandwidth compared to circuit switching.
- IP addresses in IPv4 are 32-bit numbers that identify devices on the network. Addresses are expressed in decimal notation like 192.168.1.1. Fragmentation breaks packets larger than the MTU into smaller fragments for transmission.
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Overview of the Fisheye State Routing (FSR) for cellular networks, IDC 2012
By Yoav Francis and Nir Solomon
(Part of a performance comparison of various routing algorithms in cellular networks)
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines programming challenges for sensor networks and different approaches like event-driven execution, node-level software platforms, and state-centric programming.
TCP uses congestion control to determine how much capacity is available in the network and regulate how many packets can be in transit. It uses additive increase/multiplicative decrease (AIMD) where the congestion window is increased slowly with each ACK but halved upon timeout. Slow start is used initially and after idle periods to grow the window exponentially until congestion is detected. Fast retransmit and fast recovery help detect and recover from packet loss without requiring a timeout.
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
Data link control involves framing data, flow and error control, and common protocols like HDLC and PPP. Framing involves adding source/destination addresses to frames for transmission. Flow control restricts how much data the sender sends before waiting for acknowledgment. Error control uses techniques like automatic repeat request to retransmit lost data frames. HDLC and PPP are protocols that define frame formats and control procedures for point-to-point links.
TCP provides reliable, ordered, and error-checked delivery of data between applications running on hosts communicating over an IP network. It uses three-way handshake for connection establishment, acknowledgments and retransmissions for reliability, flow control using sliding windows, and congestion control using slow start and congestion avoidance. TCP has timers for retransmissions, persistence, keepalives, and ensuring connections have terminated.
The data link layer is the second layer in the OSI model. It receives data from the network layer, applies addressing information, and provides error control, flow control and access control. It has two sublayers - the logical link control and media access control. It offers three types of services to the network layer: unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented. Common functions of the data link layer include framing data, error control using checksums, and flow control using protocols like stop-and-wait and sliding window. The media access control sublayer determines how nodes access shared broadcast networks.
The document discusses flow control in TCP. It explains that TCP uses a sliding window mechanism for flow control to balance the sender's transmission rate with the receiver's reception rate. The sliding window allows packets within the window to be transmitted, and slides to the right when acknowledgments are received, making room for more packets. Problems like delayed acknowledgments, silly window syndrome, and solutions like Nagle's algorithm are also covered. TCP provides reliable data transfer using error control mechanisms like checksums, acknowledgments, and retransmissions of lost packets.
The document provides information about the data link layer in the OSI model. It discusses that the data link layer is the second layer, and performs functions like addressing, flow control, error control, and accessing. It has two sublayers - logical link control and media access control. It provides services to the network layer like transferring data frames. The three main services are unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented. Error control methods like checksums are used. Flow control is implemented through protocols like stop-and-wait and sliding window. Framing converts data into frames. The medium access sublayer determines how nodes access shared channels and discusses protocols like ALOHA and CSMA.
The document discusses transport layer protocols, specifically UDP and TCP. It provides details on:
- UDP being a connectionless, unreliable protocol using checksums and having no flow/error control.
- TCP being connection-oriented and reliable, using sequence numbers, acknowledgments, flow and error control, and establishing connections via three-way handshakes before bidirectional data transfer.
- Both UDP and TCP encapsulating data into segments or datagrams which are delivered process-to-process using port numbers.
The transport layer provides process-to-process communication between applications on networked devices. It handles addressing with port numbers, encapsulation/decapsulation of data, multiplexing/demultiplexing data to the correct processes, flow control to prevent buffer overflows, error control with packet sequencing and acknowledgments, and congestion control to regulate data transmission and avoid overwhelming network switches and routers. Key functions of the transport layer enable reliable data transfer between applications across the internet.
The document discusses the data link layer and its functions. It covers topics such as framing, addressing, error control, flow control, and media access control. Specific protocols discussed include CSMA/CD which is used to manage access to shared mediums and prevent collisions. The data link layer has two sublayers - the logical link control layer which handles error and flow control, and the media access control layer which handles framing, addressing, and multiple access control.
TCP provides flow control between a sender and receiver to prevent buffer overflows. It works by having the sender maintain a receive window size, which indicates the available free buffer space at the receiver. The sender ensures it doesn't send more data than the receive window size allows. TCP also uses a three-way handshake to establish connections between a client and server. This involves the client sending a SYN packet, the server responding with a SYN-ACK, and the client replying with an ACK to open the connection. Connections are closed using a four-step process where each side sends a FIN packet and acknowledges the other's FIN.
The document discusses various data link layer protocols. It begins by introducing stop-and-wait and sliding window protocols. It then provides an example of a stop-and-wait protocol where a frame is lost, leading the sender to retransmit a duplicate frame. Next, it discusses sliding window protocols and provides an example where the window allows multiple outstanding frames. Finally, it gives an example of a one-bit sliding window protocol that uses acknowledgments to control the window.
The document discusses data link layer protocols. It begins by introducing the data link layer and its functions, including providing an interface to the network layer, error control, and flow control. It then discusses three elementary data link protocols: 1) an unrestricted simplex protocol with no error control, 2) a simplex stop-and-wait protocol that uses acknowledgments for flow control, and 3) a simplex protocol for noisy channels that uses positive acknowledgments and retransmissions for error control. The document focuses on the algorithms and procedures used in these elementary protocols.
The document discusses various aspects of transport layer protocols including:
- Transport layer provides reliable data transfer between source and destination through end-to-end connections.
- Elements of transport protocols include addressing, connection establishment and release, flow control, buffering, and multiplexing.
- TCP is a connection-oriented transport protocol that provides reliable, ordered delivery of bytes in a byte stream.
- HTTP is an application-layer protocol used to access data on the world wide web through request-response transactions.
TCP uses sequence numbers and acknowledgments to provide reliable data transfer over unreliable networks. It employs various algorithms like sliding windows, slow start, congestion avoidance, and fast retransmit to efficiently transfer data while addressing issues like packet loss, flow control, and congestion control. This document provides an overview of TCP, explaining concepts like how it uses sequence numbers to detect duplicates, employs sliding windows for efficiency, and utilizes fast retransmit to quickly retransmit lost packets based on duplicate acknowledgments rather than waiting for a retransmission timeout.
The document discusses various topics related to data link layer and media access control including:
1. Link layer addressing and the three types of addresses - unicast, multicast, and broadcast.
2. Address Resolution Protocol (ARP) which is used to map IP addresses to MAC addresses.
3. Error detection and correction mechanisms at the data link layer including parity checks, cyclic redundancy checks, and checksums.
4. Common data link layer protocols for flow control and error handling such as HDLC, PPP, Ethernet, and IEEE 802.11.
1. Stop-and-wait flow control is the simplest form that allows only one frame to be transmitted at a time before waiting for an acknowledgment.
2. Sliding window flow control allows multiple frames to be in transit by giving the receiver a buffer of length W, allowing the transmitter to send up to W frames without waiting for an acknowledgment.
3. Feedback-based flow control uses acknowledgments from the receiver to inform the sender how much data it can transmit, while rate-based flow control uses built-in mechanisms to limit the sender's transmission rate without acknowledgments.
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
The document discusses transport layer protocols. It covers the User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). For UDP, it describes its connectionless and unreliable nature, datagram format, services, and applications. For TCP, it outlines its connection-oriented and reliable design with features like congestion control, flow control, error checking, and segment structure. It also briefly introduces SCTP and its services.
The document discusses transport layer protocols. It covers User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Stream Control Transmission Protocol (SCTP). UDP is described as a connectionless protocol that does not provide reliability, flow control, or error checking. TCP is connection-oriented and provides reliable in-order delivery through features like sequencing, acknowledgements, retransmissions, flow control, and congestion control. TCP establishes connections using a three-way handshake and transmits data in segments. SCTP is also described as a reliable transport layer protocol providing some features of both TCP and UDP.
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
This document contains 60 multiple choice questions about communication networks and the link layer. The questions cover topics such as LAN and WAN definitions, network topologies, analog and digital signals, error detection methods like parity checks and CRC, and data link layer concepts like framing and addressing.
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
2.3b access control random access methods - part 3 - csma ca2.3b access control random access methods - part 3 - csma ca2.3b access control random access methods - part 3 - csma ca
This document discusses wireless local area networks (WLANs) and the IEEE 802.11 standard. It covers the architectural comparison of wired vs wireless networks, common problems in WLANs including attenuation, interference and multipath propagation. It also summarizes the addressing modes, access methods, frame format and architecture of WLANs including the basic service set, extended service set, and distributed coordination and point coordination functions.
The document discusses Ethernet networks and communication. It covers the evolution of Ethernet from standard Ethernet operating at 10 Mbps to 10 Gigabit Ethernet at 10 Gbps. It describes Ethernet's frame format including fields for preamble, start frame delimiter, destination/source addresses, length/type, data, padding, and CRC. It also discusses Ethernet addressing using MAC addresses and Ethernet's access method of CSMA/CD.
This document discusses access control methods in data link layer communication networks. It describes reservation, polling, and token passing as the three main types of access control. Reservation requires stations to reserve time intervals before transmitting data. Polling uses a primary station that polls secondary stations for data exchanges. Token passing organizes stations in a logical ring, passing a token from one station to the next to determine which has access to transmit.
2.3 access control random access methods - part 1JAIGANESH SEKAR
This document discusses access control methods in data link layers for communication networks. It explains the need for access control when multiple nodes use a shared medium like wireless networks. Access control mechanisms are classified into random access protocols and scheduled access protocols. Random access protocols like ALOHA and CSMA are described. CSMA variants including 1-persistent, p-persistent and CSMA/CD used in Ethernet are summarized. The document concludes with an overview of access control methods and references for further reading.
This document discusses flow control in data link layer communication networks. It describes the need for flow control to regulate data packet flow and avoid congestion. The main types of flow control mechanisms are simple protocol, stop and wait protocol, go back N protocol, and selective repeat protocol. Stop and wait protocol is explained, where the sender sends one frame at a time and waits for an acknowledgment before sending the next frame to ensure reliable transmission. The session summary reiterates flow control functions similarly to traffic signals and outlines simple protocol and stop and wait protocol.
This document discusses concepts related to media access and internetworking in computer networks. It covers topics like framing, flow control, access control, Ethernet standards, wireless LANs, Bluetooth, WiFi, Zigbee, IPv4, and network layer protocols. Specifically, it describes framing as the process of adding headers and trailers to data units, discusses fixed length and variable length framing, and methods for identifying frame boundaries like byte stuffing and bit stuffing.
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
The document discusses error detection and correction codes used in data link layers of communication networks. It specifically examines Hamming codes, explaining their structure and how parity values are computed at the transmitter side to detect and correct errors at the receiver side. Video lectures providing further details on these topics can be found on a specified YouTube channel.
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
The document discusses cyclic redundancy check codes, which are error detection codes used to detect errors in digital data during transmission. It explains how CRC works at the transmitter and receiver, including detecting errors using a polynomial representation of bits and standard polynomials. Videos are available online providing further explanation of CRC operation, the relationship between bits, characteristics of good divisor polynomials, and references.
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
This document discusses error detection and correction codes used in data communication networks. It describes the need for such codes to guarantee transmitted data is received accurately by detecting and correcting any bit errors that may occur during transmission. Two common error detection codes are discussed: parity bits, which use extra redundant bits to detect single or burst bit errors; and checksums, which sum all message words and add the checksum to the message to detect errors at the receiving end by recomputing and comparing the new sum. The document contrasts error detection, which just detects errors, with error correction, which can identify the specific bits in error and correct them.
The data link layer is responsible for moving data packets between network interfaces. It contains the media access control (MAC) sublayer for sharing a channel and the logical link control (LLC) sublayer which acts as the interface to the network layer. Physical addressing identifies devices on a network using unique MAC addresses which can be unicast, multicast, or broadcast depending on whether they address a single, group, or all devices.
This document discusses protocol layering in communication networks. It introduces the need for protocol layering when communication becomes complex. Protocol layering involves dividing communication tasks across different layers, with each layer having its own protocol. The document then discusses two principles of protocol layering: 1) each layer must support bidirectional communication and 2) the objects under each layer must be identical at both sites. It provides an overview of the OSI 7-layer model and describes the basic functions of each layer.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
5. Overview of Transport Layer
• This layer is responsible for process to process delivery of entire message.
• The system runs several process. Transport
layer is responsible for delivering the
message to the correct process.
• This can be achieved by a special type of
address called as “service point address”
11. Checksum Calculation
• The UDP check sum has 3 different
sections.
• Pseudo header
• UDP header
• Data from application Layer
12. Functions of UDP
• Connection less services
• Flow control and error control
• Encapsulation and de capsulation
• Queuing
13. Uses of UDP
• They are suitable for simple communications where error control and
flow control are little concern
• They are suitable for multicasting
• They are well suited for updating the router information.
15. Reliable Byte Stream
• In contrast to the unreliable transmission protocol we have a reliable byte
stream .
• Protocol used here is “Transmission Control Protocol” (TCP)
16. TCP Services
• Process to process communication
• Stream delivery service
• Full duplex communication
• Connection oriented service
• Reliable service
17. 1. Process to process communication
• There are few well
known ports for the
process identification.
18. 2. Stream delivery service
• The data are sent as a stream of bytes.
• This creates an virtual connection between the source and the destination.
19. • Full duplex communication:
• TCP allows full duplex communication in which the data flow in both the directions at the same time.
• Connection Oriented Services:
• Data transmission occurs in 3 stages,
• Connection is established between the source & destination
• Data are exchanged between the source and destination
• Connection is terminated.
• Reliable Services:
• TCP is an reliable protocol.
• It uses an acknowledgement mechanism to check the safe and sound arrival of data
20. Features of TCP
• Numbering system:
• They have 2 types of numbering system
• Sequence number - to identify the order of the segment
• Acknowledgement number – used to conform the reception of segment and the next segment to be sent.
• Flow control:
• Controls the amount of data sent by the sender to the receiver. To avoid the loss of packets
• Error control:
• TCP implements the error control mechanism to ensure the correct delivery of data.
• Congestion control:
• TCP implements certain strategies to ensure there is no congestion on the network.
22. Connection Management in TCP
• There are 3 phases in connection management.
Connection Establishment
Data transfer
Connection termination
23. 1. Connection Establishment
• Connection is established by a 3
way handshaking process.
• Consider the scenario shown in the
figure, where client need to
establish a connection with the
server.
24. 2. Data transfer
• After the connection is established , data
can flow in bi direction.
• The client and server can send data and
ACK
• The figure shows the timing diagram for
the data transfer phase.
25. 3. Connection Termination
• Connection termination also happens in
3 way handshaking process.
• The client ends the termination by
sending FIN signal and the same is
acknowledged from the server.
28. • TCP uses sliding window to handle the flow control
• The major difference between the sliding window flow control in data link layer
and the Transport layer is as follows
• Byte oriented in TCP, Frame oriented in DLL
• Window size is variable in TCP, Fixed in DLL
• A window can be opened, Closed or Shrink.
29. • Opening a window:
• Moving the right wall to the right. This allows new bits to be added for sending.
• Closing a window:
• Moving left wall to the right. Represents that the bytes are acknowledged.
• Shrinking a window:
• Moving right wall to the left. Revoking the eligibility of bytes for sending. Problem occurs when the bytes are
already sent.
30. • Size of the window is determined by 2 parameters.
• Receiver window (rwnd) – No of bytes that the receiver can accept.
• Congestion window (cwnd) – No of bytes that the network can carry without
any congestion.
• The window size should be a function of rwnd and cwnd
31. Transmission Process
• There are 3 mechanisms in transmission process.
Deciding the “Maximum Segment Size” (MSS)
Flushing the bytes into the buffer.
Firing the Timer for retransmission purpose.
32. Silly Window Syndrome
• Generally receiver decides the window size.
• If the available data and receiver window size is same as MSS, no problem will occur.
• In case the transmitter accumulates the data bytes and waiting for the window size from the receiver.
• Now the receiver sends the window size as MSS/2 (Half the Size of the MSS).
• Now the problem occurs at the transmitter that it has to send MSS/2 bytes of data….. Or to wait for some more period to get the
full MSS window size. So that the complete data is transmitted.
• This confusion leads to a problem called as “Silly Window Syndrome”.
Solution for this problem is : “Nagle’s Algorithm”
33. • If sender waits too long --> bad for interactive connections.
• If it does not wait long enough --> silly window syndrome.
• How to solve ?
34. Nagle’sAlgorithm
• If both available data and Window ≥ MSS, send full segment.
• Else, if there is un ACK ed data in flight, buffer new data until ACK
returns.
• Else, send new data now.
37. • Reliable data transmission is achieved by retransmitting the
segments.
• The key factor in implementing the retransmission is deciding the
Time Out Period
• The default method for setting up the Time out period
is double the period of Round Trip Time between any 2
nodes on the network
38. Problem with RTT
• Unfortunately the RTT between any 2 nodes on the network gets varied
because of several factors
39. Solution
• To eliminate this problem, TCP uses an “Adaptive
Retransmission Technique”.
• Where the Time out Period is adjusted according to the
situations.
• Several algorithms were proposed on calculating the time out period
• Original Algorithm
• Karn / Parteidge Algorithm
• Jacobson / Karels Algorithm
40. 1. Original Algorithm
• This is an simple algorithm, in which the sample time is computed for every segment sent.
• This sample time is related with the previously computed values and the final time out period
is computed as shown below
41. Drawbacks of Original Algorithm
• RTT cannot be simply calculated only based on the received ACK.
• We cannot identify the received ACK is for the original Transmission or the
Retransmitted Segment
• Consider the given scenarios.
• Case 1: ACK Sent by the Receiver is lost – segment retransmitted – received
ACK is assumed for the original transmission – Sample RTT is too long.
• Case 2: ACK is delayed by the Received – Segment Retransmitted – received
ACK is assumed for the retransmitted segment – Sample RTT is too short.
42. 2. Karn / Parteidge Algorithm
• This algorithm overcomes the drawback of the original algorithm.
• This algorithm proposes that the RTT is computed only for the segments that
are sent for the first time. (Not for the Retransmitted Segments)
• The Final time out is computed based only on the sample RTT’s of first time
sent segments
43. 3. Jacobson / Karels Algorithm
• This algorithm serves better than the predecessor method.
• This algorithm considers the variance of sample RTT’s in to account.
• Variance -- ?
49. Congestion Control
• It is very important factor to control the congestion on the network.
• Congestion occurs when the network is overloaded.
• Thus to control the congestion the flow of packets should be controlled according to the
network capacity.
• There are several techniques available. Out of which few techniques are discussed here.
• Adaptive Increase and Multiplicative Decrease.
• Slow Start
• Fast Retransmit and Fast Recovery
50. Adaptive Increase and Multiplicative Decrease. (AIDM)
• TCP maintains the congestion window size which
decides the amount of data to be transmitted.
• The size of this window can be increased or
decreased according to the occurrence of
congestion on the network.
51. Operation of AIDM
• AIDM performs slow increase in the congestion
window size when the congestion is less.
• AIDM performs sudden drop in the congestion
window size when there is a congestion on the
network
52. 2. Slow Start Method
• The draw back with the previous method is that, the system take too long time to reach the
optimum flow level.
• This methods initially sets the window size to 1 and when the ACK is received, then it
doubles the window size.
• This method is well suited in 2 conditions
• Initial stage of the transmission when the system do not know anything about the capacity of the
network.
• When the line is down for a while and again back on to service.
53. Fast retransmit and Fast Recovery
• Fast Retransmit:
• The convention system waits for the time out period to
retransmit the lost frame.
• Instead to speed up the process Fast retransmit is used.
• In this method the receivers send the previous copy of ACK
to the sender to intimate the loss of packets.
• When the receiver keeps on receiving the Duplicate ACK
then the frame is Retransmitted.
Packet 1
Packet 2
Packet 3
Packet 4
Packet 5
Packet 6
Retransmit
packet 3
ACK 1
ACK 2
ACK 2
ACK 2
ACK 6
ACK 2
Sender Receiver
54. • Fast Recovery:
• This methods modifies the operation of slow start method.
• This methods reduces the size of the congestion window to half, Instead of starting form
the beginning.
• This method helps in fast recovery of the system when there is any occurrence of
congestion in the network.
57. Introduction
• The previously discussed control mechanisms
measures the amount of congestion occurred in the
network and take steps to control.
• But it is always better to avoid congestion than
controlling.
58. Congestion avoidance Mechanisms
• There are several congestion avoidance mechanisms proposed. Few of
them are discussed here.
• Destination experiencing Congestion Bit (DEC Bit)
• Random Early Detection (RED).
• Source Based Congestion Avoidance.
59. DEC Bit
• This system introduces an congestion bit to the packets transmitted by the sender.
• This bit can either set or reset according to the congestion level.
• This bit is set when the queue length if more than 50%.
• When the receiver detects the congestion bit is set then the window size is reduced by 0.875
times the original value.
• When the queue length is less than 50% then the congestion window size is incremented by 1
byte.
60. Random Early Detection
• This bit avoids congestion by dropping the
packets.
• This method measures the queue length and
fixes minimum threshold and maximum
threshold values.
61. • When the queue length is below the minimum threshold value then no packets
are dropped.
• When the queue length lies between the minimum and maximum threshold
values then the packets are dropped according to the predefined configuration.
• When the queue length is above the maximum threshold level then all the packets
are dropped.
65. QoS - Introduction
• Qos deals with the regular flow of data throughout the network.
• There are several mechanisms incorporated to improve the QoS.
• Scheduling
• Traffic shaping
• Admission control
• Resource reservation.
66. 1. Scheduling
• Scheduling is nothing but prioritizing the various flow of packets.
• There are 3 methods.
• First In First Out Queuing (FIFO)
• Priority Queuing
• Weighted Priority Queuing
70. 2. Traffic Shaping
• This method regulates the flow of data from various rates of flow of
packets.
• This can be implemented by 2 techniques.
• Leaky Bucket Mechanism
• Token Bucket Mechanism
73. Token Bucket Mechanism
• Packets will be sent based on the token system
• Each packet consumes one token.
• The ideal time of the node are effectively utilised in this mechanism
75. 3. Admission Control
• Packets will be accepted or rejected based on the pre defined configuration.
• If the packet passes the test then the packet is accepted. Else rejected.
76. 4. Resource Reservation
• Network resources like bandwidth, queue memory can be reserved before hand for priority
applications .
79. Application Requirements
• It is first important to classify the types of application for choosing the
requirements.
• Real Time Applications
• Non – Real Time Applicaations
80. Real Time Applications
• The best examples of real time applications are Audio transmission.
• In this applications the minimum delay are most important requirement
than any other parameters.
81. Non Real time applications
• Such kind of applications do not require minimum delay as the important requirement.
• The parameters like security, correct delivery can be important requirements based on the applications
• Email, FTP and HTTP are few examples of Non Real time Applications.
82. Approaches for Deciding the QoS
• There are 2 main approaches in providing the QoS.
• Fine Grained Approach
• Provides QoS for individual Applications
• Coarse Grained Approach
• Provides QoS for large class of data or Aggregate Traffic.